Skip to main content

πŸ’Ό SA-15(8) Development Process, Standards, and Tools | Reuse of Threat and Vulnerability Information

  • Contextual name: πŸ’Ό SA-15(8) Development Process, Standards, and Tools | Reuse of Threat and Vulnerability Information
  • ID: /frameworks/nist-sp-800-53-r5/sa/15/08
  • Located in: πŸ’Ό SA-15 Development Process, Standards, and Tools

Description​

Require the developer of the system, system component, or system service to use threat modeling and vulnerability analyses from similar systems, components, or services to inform the current development process.

Similar​

  • Sections
    • /frameworks/aws-fsbp-v1.0.0/guardduty/01
    • /frameworks/aws-fsbp-v1.0.0/ssm/01
  • Internal
    • ID: dec-c-5a22535d

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [GuardDuty.1] GuardDuty should be enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [SSM.1] Amazon EC2 instances should be managed by AWS Systems Manager

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.RA-01: Vulnerabilities in assets are identified, validated, and recorded22

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags